Académique Documents
Professionnel Documents
Culture Documents
True
False
3. Physical security planning was originally based upon response to a military threat.
True
True
True
False
8. There is a theory of loss control developed by Bottom and Kostanoski in security and loss
WAECUP
Reputational damage
10. Intangible property include things such as goodwill, proprietary information, and related
property.
True
Hoofdstuk 2
Praetorian guards
1871, America
3. Railroad police were, and still are, a privately employed police force with full law enforcement
authority.
True
4. Which of these are reasons that are driving radical Islamic fundamentalism?
1
All of the above
The US president, via the attorney general, can obtain an injunction against a strike or lockout if a
False
7. Which of these are lessons that have been learned by studying the history of security?
Both B and C -> An increase in professionalism & The need for professional training
8. Allan Pinkerton was known for which of the following unique innovations?
True
Hoofdstuk 3
A man or a woman who concentrates on safety and security while others perform various tasks
3. The professional protection officer has some essential characteristics. Which of the following is
adequate balance of three characteristics which of the following is not one of those?
Communication
5. Every decision that a protection officer makes reflects on the organizations he represents; for
instance, patrol officers often times are the only people on the premises(during nights and
weekends) Which of the following tasks is most unusual to a basic protection officer?
6. The basic role of the protection officer is to prevent, mitigate, and respond to:
7. There are five types of critical resources to be protected; which of the following is not one of
those?
Time
2
8. The alue added a p ote tio offi e s pe fo a e is easu ed i the le el of i p o e e t
that his work brings into the organizations protective process and objectives. Examples of this
can include:
9. All actions taken before active protection measures are performed can be included in the
10. One of the steps taken during response functions performed by protection officers is recovery.
Hoofdstuk 4
1. Leaders and supervisors are not one and the same. Our expectation is that every supervisor is a
True
embarking on a mission to become a leader, one should conduct a self-examination in all the
Assure that no one in the group will be able to pass you up and become your boss
5. Traits that can characterize a leader in any organization include all the following, except:
6. There are numerous critical leadership skills. A leader will display all of the following skill sets,
except:
Learning how the mission of the organization compares to the leaders career goals
7. There are four communication skills needed for every leader. Which of the following is not one
of them?
False
9. Some experts say we conduct a vast amount of our communications nonverbally. No matter
3
how we or other communicate nonverbally, we must always strive for clarification if we want
10. Leaders are often called upon to institute change in a department. Change is hard to accept by
many subordinates because of insecurities or lack of trust. Resistance can be overcome by all
Inform the employees that if they cannot accept the change you will help them find work
elsewhere
Hoofdstuk 5
3. On average, how much of a salary increase do college graduates earn over noncollege
graduates?
77%
Experience provides exposure to scenarios and interaction not available in the classroom
Searching these sites provides a quick and efficient way to learn more about the candidate
9. There are four strategies for developing a career; choose the one that is not a strategy.
Homeland security
Hoofdstuk 6
4
A faithful reproduction of a message sent to a receiver clearly understood and confirmed by the
receiver
3. There are four channels of communications in most companies; which of the following is not a
channel?
Reverse-horizontal communications
4. There are six essentials of effective communications; which of the following is not one of those
essentials?
5. Effective communications has built-in flexibility to facilitate the needs of the receiver or
receiver groups. Which of the following characteristics is important to take into consideration?
6. A very important part of effective communications is that the communicator must be able to
7. The one misconception that causes more errors than any other in effective communications is:
8. The telephone equipment in a security program must be which of the following? Choose the
best answer.
It must be simple to use with the least probability of failing during an emergency
9. In the security office, separate and apart from the general use telephone, there will be a red
phone used exclusively for emergencies. That phone will have the following attachments to
10. During some emergency situations, the phone system will be destroyed, especially when there
Hoofdstuk 7
1. Security awareness is simply letting everyone know in the organization how security impacts
them and how important they are, as stakeholders and team members, to the continued
True
5
2. To e effe ti e, the se u it depa t e t should i still se u it a a e ess a o g all le els of
True
3. Security awareness meetings should be held with all departments at a minimum frequency of:
Quarterly
4. Security awareness should be instilled among half of the members, from all layers of the
False
5. In double loop communication, information should not only flow from the top of the
organization but also a process should be in place for information to travel back to the top.
True
awareness is important to them personally and for the success of the organization.
True
7. Which is a method to increase security awareness among all layers of the organization and
external partners?
Interactive activities
9. When double loop communication is used, the following employees have the opportunity to
become active:
Stakeholders
10. Team members are trained and polled regularly to heighten their awareness about changing
True
Hoofdstuk 8
1. Magnetic contact switches, motion sensors and glass break sensors are examples of what kind
of sensors.
Intrusion
2. Magnetic stripe, wiegand, proximity and biometric are examples of access control readers.
True
6
4. A main component of a medium to large access control system is the following:
Distributed processor
5. Network Attached Storage (NAS) and Storage Area Networks (SAN) are examples of large
True
6. The 10-codes are used to assist with rapid transmission of radio communications.
False
7. Access control sensors may be uses to detect unauthorized access to a facility, and to generate
security alarms in response. Which of the following is not one of those access control sensors:
8. A transmission medium is simply the method by which an electronic message is carried. Signals
may be transmitted in a variety of ways. Which of the following is not one of those mediums
False
10. Gas, temperature and power failure are examples of which of the following sensors:
Building automation
Hoofdstuk 9
1. Automated visitor management systems should only be used in large, complex organizations
False
2. One use for crime mapping is to help determine where to locate new facilities.
True
3. Studies indicate that security technologies will soon make security officers obsolete.
False
4. Incident Management Systems today are really nothing more than word processing systems
False
5. Two dangers mentioned in this chapter that protection professionals should be aware of in
The possibility of going off on a tangent rather than focusing on the objective & Assuming that
7
6. Among the advantages of automated visitor management systems are (circle all that apply):
Ability to keep a searchable record of visitors & Ability to better account for all building
An orientation on automated tools such as incident and visitor management systems as well as
9. A number of studies in recent years have projected massive expansion of electronic security
systems employing advanced technologies, but they also concluded that the human element
True
10. Technology and automation is not bringing the benefits, efficiencies, and opportunities to the
False
Hoofdstuk 10
1. Uniformed and paid police did not come around until which of the following:
2. The patrol function is the lease important but necessary part of the loss control approach.
False
3. Based on organizational needs, there are many major purpose of patrol. Which of the following
4. There are basically two types of patron. Which of the following are those two types?
5. Preparation for a patrol tour of duty requires more than just putting on the uniform and going
True
6. If the officer is working the overnight shift, 2200 to 0600, it is advisable to do which of the
following:
Visit the work site during the day for facility orientation
7. There are numerous techniques that help an officer to detect unusual situations. Which of the
8
following is one of those techniques:
9. Which of the following is a principle of patrol that every patrol person should follow:
Environmental conditions
Hoofdstuk 11
1. The following sign is without doubt the most important sign in use today.
Stop
2. Directing traffic from or at the gate would include such duties as checking.
3. On private property, the save movement of traffic is the responsibility of the security officer.
True
Palm open
5. Slow or timid drivers should not be urged forward with increased rapidity of arm motion
False
6. Directing traffic from the corner position is safer than a center-of-the-intersection position.
True
7. Proper protection against the elements is an important factor in maintaining efficient traffic
control.
True
False
Hoofdstuk 12
9
1. In controlling a hostile crowd, sufficient _______ is/are basic to you success.
Manpower
Removing them
3. If you are observe a hostile crowd gathering, never hesitate to request additional:
Assist
True
5. A riot means any extreme or catastrophic condition that imperils or result in loss of life and/ or
property.
False
6. The basic reason for the formation of any crowd is the occurrence of an event that is of
True
Escape crowd
Hoofdstuk 13
1. Environmental crime control theory focuses upon the _______ of the crime act:
Location
2. Basically the offender use a decision making process whereby the positive and negative
3. The application of situational crime prevention techniques are the results of this theory.
Six
10
5. There are three key concepts specific to CPTED. Which of the following is not one?
Defensible space
Five
Five
8. Defensible Space: Crime prevention Through Urban Design was created by:
Oscar Newman
9. This revolves around public housing and seeks to reduce crime though the use of natural
Defensible space
10. Routine Activity Theory, developed by Cohen and Felson, revolves around three things: which
Hoofdstuk 14
1. Risks are usually categorized into three categories. (Sele t o e that does t appl .
Insurance
2. Physical security planning is a recognized security process that, if followed, will result in the
True
Five
Layered Protection
True
False
True
Chain-link
11
7 feet
10. Which of the following types of light are only lit on an as-requires basis?
Standby
Hoofdstuk 15
Alarm systems
3. According to the text material, the most effective security is provided with a:
Layered approach
4. In more sophisticated alarm systems, sensors are interfaced with electronic entry-control
device, CCTV, alarm reporting displays (both visual and audible), and _______.
Security lighting
5. How many different types of alarm monitoring were examined in the text?
Four
Satellite
A perimeter sensor
A panic button
Hoofdstuk 16
Keeping
Register
3. _______ of regular occupants to a facility is considered a very secure form of access control.
Recognition
4. There needs to exist a clear policy for the denial of _______ for individuals without proper
12
credentials.
Access
Key
6. _______ key blanks can have a restricted issue to one distributor or end user.
Proprietary
7. The feature of access control systems operating off-line and not connected to a host computer
Degraded
8. Smartcards have the ability to store a biometric _______ among other types of information.
Template
10. Biometric technology is slowly being removed from usage in airports and other immigration
checkpoints.
False
Hoofdstuk 17
1. How many suspect components of an explosive device are needed to warrant a possible
threat?
Two
Projectile
Unprofessional behavior by a dog and its handler may ruin the company’s reputatio
Ferromagnetic Material
5. Which of the following is not a metal detection technology used prominently in security
applications?
CT Scan
Nitrogen dioxide
13
8. Electronic article surveillance (EAS) systems are used to detect:
Fraudulent activity
10. Which of the following is not a consideration when using X-ray detection technologies?
Hoofdstuk 18
True
False
False
4. Human life and safety should be the primary concerns in fire situations.
True
False
Hoofdstuk 19
False
2. The protection officer must take continuing education in HAZMAT and first aid.
True
14
3. The Wo ld Health O ga izatio has defi ed health as o e tha just the a se e of disease.
True
4. One aspect of a formal safety policy is to prevent accidents and illness on and off the job.
False
5. One of the main functions of a safety committee is to administer effective rescue training
programs.
False
6. The safety committee has the authority to make safety recommendations to management.
True
7. The protection officer should carefully inspect the work habits of members of the workforce
True
Hoofdstuk 20
False
False
True
4. In a crisis involving the release of a hazardous material, the first thing that must be done is to
True
5. The stand response protocol consists of three consecutive steps. The correct order of these
steps is:
Identify the material, activate the appropriate contingency plan, perform site security
6. There are several ways to determine what hazardous material has been released in an
15
Ask the person who was using it
True
True
9. The most comprehensive and detailed information concerning a specific hazard would be
found in the:
10. The fumes from hazardous materials release have been known to carry 20 miles or more.
True
Hoofdstuk 21
1. Computer security, information security, and information technology (IT) security all mean the
False
True
True
75%
5. The practice of asset p ote tio fo uses o hi h atego ies of assets ? Ci le all that appl .
6. Which of the following is NOT a characteristic of the Economics Espionage Act of 1996?
IT security
8. When an information loss is known or suspected, the following actions should be taken:
False
10. An important tool is protecting information assets is the Economic Espionage Act (EEA) of
16
1996.
True
Hoofdstuk 22
Punishment carnality
2. Routine activity theory states that crime will only happen when a motivated offender, a
suitable target, and the absence of _______ occur at the same place and time.
Capable guardians
3. Social learning theory is only about learning how to commit a crime, not why crime might be
acceptable.
False
4. Which of the following is an example of a technique of neutralization that would be used if the
employee believed the company would get insurance money to replace the loss?
Denial of injury
Reporting
6. Liaison with nonsecurity employees has many benefits for the protection officer.
True
convenience.
False
Either a or b
False
True
Hoofdstuk 23
True
17
choice.
False
4. A company can effectively fight substance abuse by just starting a drug testing program.
False
5. A person who does not use drugs, but is preoccupied with a loved one who does, is said to be
codependent.
True
Write a policy
7. The most widely used drug testing material is use today is:
Urine
Brain
10. The protection officer is to take which of the following actions in reference to substance abuse
Hoofdstuk 24
True
2. xx
3. Workplace violence can occur in almost every workplace: small business, large companies,
government facilities.
True
4. An employee who exhibits rude manners toward his or her fellow workers is a definite
False
5. In a 2006 survey conducted by the Bureau of Labor Statistics, U.S. Department of Labor, for the
National Institute of Occupational Safety and Health, Centers for Disease Control, what
34,1%
6. There are many effects of workplaces violence on an organization. Find the most correct group
18
of effect below.
of equipment/facilities
7. Although the 2006 survey discussed in this section indicated that 51,4% of responds reported
that workplace violence events had no effect on their workplace, 29,7% reported that this
Fear levels
9. According to this chapter, the generally recognized primary objective of a security program is
10. According to this chapter, a very small percentage of employees who have violent propensities
True
Hoofdstuk 25
Stress
Temper
4. Being complacent during a crisis situation is good; is allows the individual not to know what
False
5. The best stance during a crises situation is just off the side at an angle.
True
6. Indistinct signs of possible physical acting out, such as gritting teeth, closing and opening of
True
False
19
which of the following?
9. Persons who are behaving in a physically violent manner may be controlled in all of the
Challenged
10. When involved in a one-on-one situation, the first action taken should be:
Hoofdstuk 26
1. Labor relations include the employee/employer relations dealing with matters pertaining to
2. The role of the protection officer has an influence on the labor relations climate at any given
company. Which of the following activities does the protection officer influence:
3. Which of the following is a legal move by management to put pressure on the unions:
Lockout
False
5. Work stoppages as a result of labor relations difficulties will arise when union officials order
production limitations.
True
6. The protection officer should be aware of the types of discipline available to his employer
because:
Carrying placards
9. The strike plan is designed and updated to eliminate problems that occur during a strike and
True
20
Hoofdstuk 27
True
False
3. Because vulnerabilities are actually a characteristic of the organization or facility, they are:
The risk factor over which the organization has the most control
o se ue e isk?
Quadrant 1
Risk transfer
8. Which one of the following is not one of the underlying concepts on which a risk mitigation
Quantitative analysis
9. Risk management is a critical process that touches every aspect of organizational asset
True
10. Service providers should not base their core business on risk management principles.
False
Hoofdstuk 28
1. Regardless of the type of crises, there is a series of common requirements that must be taken
into account for an organization to be successful when a critical incident occurs. These include
2. Observing which of the following guidelines increases the chances that emergency plans will be
21
None of the above
3. The National Fire Protection Association (NFPA) standard 1600 sets criteria for both developing
True
4. The Incident Command System (ICS) indentified common concepts that form the basis for the
control and management of emergencies. Which of the following is not one of those concepts:
Concentricity
5. The National Response Framework (NRF) established and on-scene management system that
would help responding agencies work together using a coordinated and systematic approach
False
6. The ICS structure is built around five major management activities of functions. Which of the
Safety
7. The National Incident Management System (NIMS) provides a systematic, proactive, all-
hazards approach that guides all levels of government, non-governmental organizations, and
the private sector to work together to respond to and manage incidents of all sizes.
True
8. Effective crisis media communications steps that organizations should consider include all the
following except:
9. An emergency response plan will work regardless of any realistic training prior to the
False
10. In addition to a yearly audit of the emergency plan, that plan should be evaluated and
Hoofdstuk 29
True
True
22
3. The worst terrorist act on U.S. soil was the bombing of the Murrah Federal Building in
False
Individual
6. The CARVER model of target selection offers a useful tool for considering a target.
True
7. A security professional need only concentrate on their own facility when coping with terrorism.
False
8. Formal threat assessments are certainly important, however, regularly monitoring of the
True
9. An example of a non-violent extremist might be an animal rights supporter that uses no animal
products at all.
True
False
Hoofdstuk 30
1. Personal protection specialist should attempt to stand out as obvious security personnel in the
False
2. Personal protection specialist should only worry about assassins and kidnappers, since
False
3. A principal is about to enter a room; a protection specialist should enter the room before the
protectee to make sure it is safe and consider closing the blinds to prevent outside adversaries
True
4. When in the presence of a hostage taker or other violence-prone individual you should
23
Remain calm, use your first name, and cooperate with the hostage takers
6. A polite respectful approach will make those being searched more cooperative with a search
True
adversaries.
True
8. Counterterrorist security personnel should read and become intimately familiar with detection
True
True
10. Which of the following is the least agreeable time to detect a terrorist plot?
Hoofdstuk 31
3. Weingarten established the Exclusionary Rule, which prohibits statements made in violation of
False
Liaison
24
False
8. An officer can testify in several different legal arenas for a single case:
True
False
Hoofdstuk 32
1. The security offi e s responsibilities when arriving at a crime scene is which of the following:
2. To track loss-event-occurrences, the organization needs to know all of the following except?
3. Physical evidence found at the crime scene may explain what exactly happened and/or provide
a list of suspects. Which of the following is not an item of physical evidence found at a crime
scene?
4. If it is imperative that evidence at a crime scene is recovered and protected by the security
5. When writing a report from your notes, which of the following will not be included:
6. Which of the following is the fi st responding officer responsible for at the crime scene:
7. Once the protection officer arrives on the scene, the fi st priority is to:
8. The scene of a crime or incident will always require a boundary using police tape.
True
9. The boundaries of a crime scene will be immediately evident once the protection officer arrives
on the scene.
False
10. It is necessary to establish the boundaries of a crime scene before an investigation can begin.
True
Hoofdstuk 33
25
1. When an incident or crime occurs, the responding protection officer is expected to protect the
True
written or verbal.
True
3. Interviewing people is NOT the best way to gather information as there are many other more
False
False
5. Tension will often cause speech to become more rapid and stammered sometimes
2 — 3 times
True
8. Deception can take additional forms other than what some may immediately think is a lie or
untruthful statement.
True
9. Whe the p ote tio offi e o ludes the interview they should make detailed notes of the
following:
10. The p ote tio offi e should continue with a professional demeanor when dealing with:
Hoofdstuk 34
True
False
3. Equipment requirements vary depending on the location, nature, and goal of the operation.
True
26
4. A proper understanding of privacy issues is only important if the case goes to court.
False
without the prior knowledge and consent of both parties on that call.
True
10. If storage space becomes an issue, it might be that noncritical materials have to be discarded.
True
Hoofdstuk 35
1. Incidents must always be written in a way that shows the organization in a favorable manner.
False
False
3. There are six (6) questions that every report must attempt to answer and they include: Who,
How
5. It is important to state your opinion in incident reports to ensure that a age e t a figu e
False
True
False
27
True
True
False
Hoofdstuk 36
1. A protection officer may force a search of an employee where there is a company policy.
False
2. A store can be liable for the actions of its protection officer if it can be proven that the officer
was:
Their agent
True
False
True
7. You cannot sue someone and press criminal charges. It is double jeopardy.
False
Criminal matters
10. A confession may not be admissible in court unless it can be shown that (check all that apply).
Hoofdstuk 37
True
2. Using force is generally the first option that an officer chooses when managing the behavior of
others.
False
28
3. Persons that force is used against must demonstrate that they have the _______ to cause
injury, that they manifest intent to do so, and that they are placing the officer in imminent
jeopardy.
Means
4. _______ means that officers must show that they had no other alternative than to use force.
Preclusion
5. Objects of materials that protect one from bullets or other projectiles as rocks that are thrown
is:
Cover
6. Control = _______/emotions.
Intellect
7. The security officer must use alternative use of force whenever possible. Which of the
8. There are five primary justifications for using force. Which of the following is not one of them?
There are five primary justifications for using force. Which of the following is not one of them?
9. The following are three recommendations on how to safely manage violence prone
encounters. There is also one recommendation that you should never try. Which one is the
Do now waste time evaluating the situation; react immediately before anyone gets hurts
10. Report writing after a use of force is very important. What the officer writes of fails to write
can get that officer in trouble if the subject decides to bring a lawsuit. Therefore, remember
that you may be writing to the lawyers, a judge, or a jury in a civil lawsuit. While writing the
incident report, the officer must include all the following, except:
If the subject was injured, be sure to state that you accidently injured the subject; is was not
intended
Hoofdstuk 38
True
False
29
3. It is always wrong to withdraw from a situation.
False
4. Firearms are the final phase (highest level) of the range of response.
True
6. The possession and use of weapon are dependent upon which policies?
True
10. Training that is going to help every day in a security job is:
Hoofdstuk 39
1. The definition of a hazard specifies those conditions in the physical or natural environment
False
2. An example of workplace violence may include when a security officer is surprised and
True
True
False
5. The security officer must make personal choices in health and fitness to help them adjust to a
hazardous environment.
True
False
30
7. Risk assessment is a thorough, comprehensive, and ongoing evaluation of the key assets,
threats, hazards, vulnerabilities, and procedures in place to protect a facility from loss.
True
8. Risky behavior or improper operation of equipment by the security officer are a few examples
of environmental hazards.
False
9. The most important asset that should be protected within a facility is the security command
post.
False
10. Durable, safe, comfortable footwear is a key piece of personal safety equipment for the
True
Hoofdstuk 40
autho it .
True
2. In order for an arrest to be legal and binding, the person making the arrest and the person
3. Security officers do not have the same authority to make an arrest as a citizen unless some
False
4. Based on the circumstances a private person may make an arrest for which of the following
offenses:
5. Authorization to make an arrest will come from all the following places except:
6. Contrary to popular belief, at least in most jurisdictions, you do not have a touch someone to
be looking at a criminal assault charge. You only have to place another person in a reasonable
True
False
31
8. Guilt in civil court requires what percentages of proof?
9. Malicious prosecution happens when a security officer detains someone with the full intention
of bringing criminal charges against them, of filing criminal charges without probable cause.
False
True
Hoofdstuk 41
1. In a multicultural World, what type of language must a protection officer use to gain the trust
of their audience?
Inclusive
2. The p ote tio offi e s a ilit to effe ti el o u i ate ill also e e ha ed _______
listening.
Active
3. In a multicultural world, leadership ability can determine if a protection officer has the
False
4. Future policing will depend in large part on the type of society being policed – the _______,
_______, _______ realities and, in more developed countries, the technological sophistication
of the populace.
False
False
7. Women in protection are taking on more leadership roles than ever before. There is, however,
a _______ ceiling that prevents them from being promoted beyond a certain level.
Glass
True
10. Supply chain security is a rapidly growing area for both corporations and government.
32
True
Hoofdstuk 42
legitimate interest in how those duties and responsibilities are carried out?
2. There is more to department of the security officer than looking professional, and performing
in a reasonable and necessary manner. The security officer must have all the following
characteristics but one. Which one of the following is not mentioned in the text?
The security officer must appear to have real concern for others
3. To accomplish the goal of projecting a positive image, the security department must first have
a quality program in place. Once this one, the Ten Rules of Public Relations in Private Security
The Security Officer must select the persons he or she will serve
4. In addition, the Ten Rules of Public Relations in Private Security instruct the security officers in
When the person you are serving only wants to argumentative, you must cut them off cold and
5. There are many actions that a security supervisor can take to motivate their subordinates to do
a better job at public relations. Which of the following is not one of those actions?
Give each officer extended smoke breaks as a reward for a job well done
6. In addition to daily refresher training, supervisors should make certain that the security
officers in his or her command adopt favorable work behaviors. Of the following work
The security officer should be schooled in money management so they will be able to live very
7. Handling customer complaints is not always fun. In some cases, the security officer may wind
up acting like a referee. Of the following, which is a good recommendation for how to handle
complaints?
8. Security departments are service departments. The personnel in security departments can be
found doing all kinds of jobs to help their companies. Of the following activities that security
officers might be asked to do, which is not likely a task they will follow?
33
Li i g up ateri g servi es for the CEO’s a ual vi e preside ts’ eeti g a d golf outi g
9. By performing a risk analysis, the security department is placing itself in a security consulting
relationship whit the company. Risk analysis can also help with loss control efforts. Which of
the following is not a setting where a risk analysis would be very helpful?
10. Whenever a facility has a critical fire, explosion, or another cataclysmic event, the media is
sure to be there. When they arrive, they will attempt to interview the first person they see so
they can get the story on the evening news. Many times, that person is the security officer.
Which of the following is a good idea of how the security officer should respond?
Hoofdstuk 43
1. The society that wants to buy what they buy based on the thrill derived from the item
Experience economy
4. In a service-related business, such as security, total quality costs can be significantly reduced
by the various users of its services with whom the operation comes in contact. It is more than
6. Branding is about the image of the operation at every touch point, at every single place anyone
True
7. Our account representative, our executives, even our officers should interact with our client or
9. The key to your success lies in your ability to build which of the following with the
10. The next type of economy, after the experience economy, will be the transformation economy.
True
Hoofdstuk 44
1. Contacts made outside your company with other professionals tend to enhance both the
security operation as well as the security professional. Professional liaison relationships can
2. The elements of VIP protection include protective detail, access control, armored limousines,
False
3. Performing duties professionally when VIPs are in the area creates an opportunity for security
False
4. When emergency situations occur, the first responding security officer is expected to take
certain emergency steps. When public assistance arrives, what they find can bring recognition
for that first responding security officer. Which of the following is one of those recognition
tasks:
Clear the area of all non-emergency persons, secure the incident scene providing an
5. Which of the following are good contacts for the security professional to make contact with
because they offer the best opportunity to form long lasting relationships with:
6. Networking relationships are valuable because they can lead to training opportunities.
True
7. As for fire emergencies, security personnel might be in a position to assist the responding
police officers hence forging positive relationships with local law enforcement. Detectives from
that same police department may arrive asking for additional help providing even a further
opportunity for valuable contact development. Which of the following are ways to be of
assistance:
35
All of the above
Training opportunities
9. Professional development groups, like the IFPO and ASIS International, can also introduce a
True
10. Every large company in the United States employs instructors in the security discipline that
have had real-world experience. This provides future opportunities for security professionals
True
Hoofdstuk 45
Private security
Deportment
4. There is substantial legal leeway concerning the amount of force that can be used to restrain a
True
False
6. Using the _______ acronym can assist one in dealing with ethical dilemmas.
PORT
Rights
True
Resistance
10. The world of asset protection is black and white. There is no gray area. : FALSE
36